Proceedings of International Conference on Applied Innovation in IT
2024/11/30, Volume 12, Issue 2, pp.35-44
Context-Defined Model of Open Systems Interaction for IoT Cybersecurity Issues Study
Victor Tikhonov, Eduard Siemens, Yevhen Vasiliu, Valery Sitnikov, Abdullah Taher, Olena Tykhonova, Kateryna Shulakova and Serhii Tikhonov Abstract: The article considers the issues of IoT systems and networks privacy. The complex researches on general system theory state of the art has been surveyed, as well as cybersecurity aspects of IoT technologies and models analyzed over the past decades with respect to the Industry 4.0 concept and industrial IoT architecture. A comprehensive decomposition formalism proposed on the base of M. Mesarowic system theory for presenting the complex cybersecurity object of study as a set of its parts. An original context-defined model of open systems interaction S-CDM has been constructed for cybersecurity issues study with the use of J. Neumann classification and A. Uemov system triad. The S-CDM model is shaped in 3-layer hierarchical graph. The first S-CDM layer displays the cybersecurity problem as a set of relations between the key players of information market - resources, clients and agents. The second S-CDM layer adds the network technologies impact on the relations between the key market-players. The third S-CDM layer includes a “degree of trust” factor into the key market-player relationships. The introduced context-defined model enables to reduce the overall problem complexity of the IoT cybersecurity study to a number of less complex and easy-handled partial tasks. As an example, a particular local version of the S-CDM model is considered in the form of six independent tasks for AI-aided methods of cybersecurity provision. The results of the work intend to contribute general system researches in the sphere of network system modelling and IoT privacy.
Keywords: Internet of Things, Open Systems and Networks, General System Theory, Cybersecurity, Context-Defined Model
DOI: 10.25673/118112
Download: PDF
References:
- A. Dennis et al. “System analysis and design”, 5th ed., John Wiley & Sons, 2012, 563 p. [Online]. Available: https://www.google.com/search?client=safari&rls=en&q=Dennis+A.+Wixom+B.H.+System+Analysis+and+Design+5+Ed++pdf&ie=UTF-8&oe=UTF-8.
- A.E. Kononuk "Systemology. General System Theory", Book 1. Basics, Kiev, 2014, 568 p. [Online]. Available: https://z-lib.io/book/16404592f.
- A. Dennis et al., System Analysis and Design, 5th ed., John Wiley & Sons, 2012, 563 p. [Online]. Available: https://www.google.com/search?client=safari&rls=en&q=Dennis+A.+Wixom+B.H.+System+Analysis+and+Design+5+Ed++pdf&ie=UTF-8&oe=UTF-8.
- A. E. Kononuk, Systemology. General System Theory, Book 1. Basics, Kiev, 2014, 568 p. [Online]. Available: https://z-lib.io/book/16404592f.
- T. Cody et al., “Motivating a Systems Theory of AI,” ResearchGate Special Feature, vol. 23, no. 1, pp. 37-40, 2020. [Online]. Available: https://www.researchgate.net/publication/340652980_Motivating_a_Systems_Theory_of_AI.
- K. Lang et al., “A systems theory-based conceptual framework for holistic digital transformation,” 2021, 24 p. [Online]. Available: https://www.researchgate.net/publication/352020735_A_systems_theory-based_conceptual_framework_for_holistic_digital_transformation.
- Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence, President’s Council of Advisors on Science and Technology, 2023, 36 p. [Online]. Available: https://www.federalregister.gov/documents/2023/11/01/2023-24283/safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence.
- M. Abomhara and M. Koien, “Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks,” Journal of Cyber Security, vol. 4, pp. 65–88, 2015. [Online]. Available: https://www.researchgate.net/publication/349642687_Cyber_Security_and_the_Internet_of_Things_Vulnerabilities_Threats_Intruders_and_Attacks.
- M-Bus und M-Bus Wireless Grundlagen. [Online]. Available: https://www.wachendorff-prozesstechnik.de/technologie/feldbus/m-bus/.
- H. Ziegler, Serial BUS Systems. [Online]. Available: https://m-bus.com/assets/downloads/MBDOC48.PDF.
- S. Payne, “Zigbee Technology: Everything You Need to Know for IoT,” 2023. [Online]. Available: https://www.telit.com/blog/zigbee-iot-guide/.
- ZigBee PRO/2007 Layer PICS and Stack Profiles, Rev. 08, 2018. [Online]. Available: https://infocenter.nordicsemi.com/pdf/Zigbee_PRO_Layer_PICS_and_Stack_Profile_8.pdf.
- “Y.2060: Overview of the Internet of Things,” 2012. [Online]. Available: https://www.itu.int/rec/T-REC-Y.2060-201206-I.
- “IoT Reference Model Introduced at IoT World Forum 2014.” [Online]. Available: https://ytd2525.wordpress.com/2014/10/22/iot-reference-model-introduced-at-iot-world-forum-2014/.
- “IoT World Forum Reference Model,” 2014. [Online]. Available: https://www.researchgate.net/figure/IoT-World-Forum-Reference-Model_fig2_323525875.
- “What is Industry 4.0?”. [Online]. Available: https://www.ibm.com/topics/industry-4-0/.
- J. Voas, Networks of Things, NIST Special Publication 800-183, 2016. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-183.pdf.
- “IIoT Explained: Examples, Technologies, Benefits and Challenges.” [Online]. Available: https://www.emqx.com/en/blog/iiot-explained-examples-technologies-benefits-and-challenges.
- “Dotdot was a huge hit at CES 2017.” [Online]. Available: https://www.symmetryelectronics.com/blog/dotdot-was-a-huge-hit-at-ces-2017/.
- “What is Dotdot?”. [Online]. Available: https://en.dsr-corporation.com/news/what-is-dotdot.
- IEEE 802.15.4 Standard for Low-Rate Wireless Networks, 2020. [Online]. Available: https://store.accuristech.com/standards/ieee-802-15-4-2020.
- R. Joshi et al., The Industrial Internet of Things Connectivity Framework, 2022. [Online]. Available: https://www.iiconsortium.org/wp-content/uploads/sites/2/2022/06/IIoT-Connectivity-Framework-2022-06-08.pdf.
- C. Baudoin et al., “Global Industry Standards for Industrial IoT,” 2022. [Online]. Available: https://www.iiconsortium.org/pdf/IIC_Global_Standards_Strategy_Whitepaper.pdf.
- “EMQX Overview.” [Online]. Available: https://docs.emqx.com/en/emqx/latest/.
- M. A. Razzaq et al., “Security Issues in the Internet of Things (IoT): A Comprehensive Study,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, pp. 383-388, 2017.
- “Zigbee Security 101. Architecture And Security Issues,” 2023. [Online]. Available: https://payatu.com/blog/zigbee-security-101-architecture-and-security-issues/.
- The Industrial Internet Reference Architecture, 2022. [Online]. Available: https://www.iiconsortium.org/wp-content/uploads/sites/2/2022/11/IIRA-v1.10.pdf.
- Industrial Internet of Things. Volume G4: Security Framework, 2016. [Online]. Available: https://www.iiconsortium.org/pdf/IIC_PUB_G4_V1.00_PB.pdf.
- R. Kaur, D. Gabrijelčič, and T. Klobučar, “Artificial intelligence for cybersecurity: Literature review and future research directions,” Elsevier, Information Fusion, vol. 97, 2023.
|

HOME

- Call for Papers
- Paper Submission
- For authors
- Important Dates
- Conference Committee
- Editorial Board
- Reviewers
- Last Proceedings

PROCEEDINGS
-
Volume 12, Issue 2 (ICAIIT 2024)
-
Volume 12, Issue 1 (ICAIIT 2024)
-
Volume 11, Issue 2 (ICAIIT 2023)
-
Volume 11, Issue 1 (ICAIIT 2023)
-
Volume 10, Issue 1 (ICAIIT 2022)
-
Volume 9, Issue 1 (ICAIIT 2021)
-
Volume 8, Issue 1 (ICAIIT 2020)
-
Volume 7, Issue 1 (ICAIIT 2019)
-
Volume 7, Issue 2 (ICAIIT 2019)
-
Volume 6, Issue 1 (ICAIIT 2018)
-
Volume 5, Issue 1 (ICAIIT 2017)
-
Volume 4, Issue 1 (ICAIIT 2016)
-
Volume 3, Issue 1 (ICAIIT 2015)
-
Volume 2, Issue 1 (ICAIIT 2014)
-
Volume 1, Issue 1 (ICAIIT 2013)

PAST CONFERENCES
ICAIIT 2024
-
Photos
-
Reports
ICAIIT 2023
-
Photos
-
Reports
ICAIIT 2021
-
Photos
-
Reports
ICAIIT 2020
-
Photos
-
Reports
ICAIIT 2019
-
Photos
-
Reports
ICAIIT 2018
-
Photos
-
Reports
ETHICS IN PUBLICATIONS
ACCOMODATION
CONTACT US
|
|